Sciweavers

390 search results - page 67 / 78
» Novel architectures for P2P applications: the continuous-dis...
Sort
View
CCS
2007
ACM
14 years 1 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
FPGA
2007
ACM
119views FPGA» more  FPGA 2007»
14 years 1 months ago
Synthesis of an application-specific soft multiprocessor system
The application-specific multiprocessor System-on-a-Chip is a promising design alternative because of its high degree of flexibility, short development time, and potentially high ...
Jason Cong, Guoling Han, Wei Jiang
ICSOC
2007
Springer
14 years 1 months ago
Automated Dynamic Maintenance of Composite Services Based on Service Reputation
Abstract. Service-oriented computing promotes the construction of applications by composing distributed services that are advertised in an open service market. In such an environme...
Domenico Bianculli, Radu Jurca, Walter Binder, Car...
CCECE
2006
IEEE
14 years 1 months ago
Lazy Generation of Building Interiors in Realtime
Impenetrable doors are often quite common in virtual worlds. This is especially apparent in video games boasting large urban environments. Although there are often enterable build...
Evan Hahn, Prosenjit Bose, Anthony Whitehead
ECML
2005
Springer
14 years 1 months ago
Natural Actor-Critic
This paper investigates a novel model-free reinforcement learning architecture, the Natural Actor-Critic. The actor updates are based on stochastic policy gradients employing Amari...
Jan Peters, Sethu Vijayakumar, Stefan Schaal